An organization plans to acquire a commercial off-the-shelf (COTS) system to replace their aging home-built reporting system. When should the organization's security team FIRST get involved in this acquisition's life cycle?
A.
When the system is verified and validated
B.
When the need for a system is expressed and the purpose of the system is documented
C.
When the system is deployed into production
D.
When the system is being designed, purchased, programmed, developed, or otherwise constructed
given answer is correct. security has to get involved to complete the ESR (external security review) before even considering bringing in the application to the organisation. then the new application has to go through an application security review where validation and verification happen. once the application security review completed, it can go for a proof of concept (PoC) OR to the production depends on the organisation plan.
B. When the need for a system is expressed and the purpose of the system is documented.
It's crucial for the security team to be involved from the early stages of the acquisition process to ensure that security requirements are considered and integrated into the system's design and procurement. Waiting until the system is already in production (option C) or at later stages may lead to security issues being overlooked or inadequately addressed.
D. B is only when someone says they would like software that does so and so. That's purely business. Security gets in from the beginning, but beginning of the actual application, not just talk about an application. D is the answer that makes the most sense.
I am a Linux admin and in the past infosec has come to us with products to evaluate. So the need for a product was declared by business, Infosec was now in the stage of evaluating products that will fulfill the need. B is just too early.
A, For COTS, while the organization may not be responsible for code-level security, it does not have an easy way to verify that it was done right, and the organization is the loser if there is a problem.
https://www.cisa.gov/uscert/bsi/articles/best-practices/legacy-systems/security-considerations-in-managing-cots-software
even in the case of Commercial Off-The-Shelf (COTS) applications, it's advisable to involve the security team during the early phases of the acquisition process. While COTS applications are pre-built and not developed in-house, security considerations are still crucial. The security team should assess the security features and potential vulnerabilities of the COTS software, ensure it aligns with the organization's security policies, and consider any necessary configurations or additional security measures. By involving the security team early, you can make more informed decisions and ensure that security is a priority throughout the acquisition process.
upvoted 1 times
...
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Logan3003
Highly Voted 2 years, 1 month agojackdryan
1 year, 6 months agoSoleandheel
Most Recent 11 months, 2 weeks agoHughJassole
1 year, 4 months agoHumongous1593
2 years, 1 month agoccmmaa
2 years, 1 month agoVino22
2 years, 1 month agofranbarpro
2 years, 1 month agovinaysingh16
1 year ago